37 Star 407 Fork 74

GVPrancher/rancher

加入 Gitee
与超过 1200万 开发者一起发现、参与优秀开源项目,私有仓库也完全免费 :)
免费加入
克隆/下载
actionhandler.go 23.58 KB
一键复制 编辑 原始数据 按行查看 历史
123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694695696697698699700701702703704705706707708709710711712713714715716717718719720721722723724725726
package cluster
import (
"bytes"
"encoding/json"
"fmt"
"io"
"io/ioutil"
"net/http"
"time"
yaml2 "github.com/ghodss/yaml"
"github.com/pkg/errors"
"github.com/rancher/norman/api/access"
"github.com/rancher/norman/httperror"
"github.com/rancher/norman/types"
"github.com/rancher/norman/types/convert"
"github.com/rancher/norman/types/values"
"github.com/rancher/rancher/pkg/clustermanager"
"github.com/rancher/rancher/pkg/controllers/management/etcdbackup"
"github.com/rancher/rancher/pkg/controllers/user/nslabels"
"github.com/rancher/rancher/pkg/kubeconfig"
"github.com/rancher/rancher/pkg/kubectl"
"github.com/rancher/rancher/pkg/monitoring"
"github.com/rancher/rancher/pkg/ref"
"github.com/rancher/types/apis/cluster.cattle.io/v3/schema"
corev1 "github.com/rancher/types/apis/core/v1"
"github.com/rancher/types/apis/management.cattle.io/v3"
"github.com/rancher/types/client/cluster/v3"
mgmtclient "github.com/rancher/types/client/management/v3"
"github.com/rancher/types/compose"
"github.com/rancher/types/user"
errors2 "k8s.io/apimachinery/pkg/api/errors"
"k8s.io/apimachinery/pkg/api/meta"
metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
"k8s.io/apimachinery/pkg/apis/meta/v1/unstructured"
"k8s.io/apimachinery/pkg/runtime"
"k8s.io/apimachinery/pkg/util/yaml"
clientcmdapi "k8s.io/client-go/tools/clientcmd/api"
)
type ActionHandler struct {
NodepoolGetter v3.NodePoolsGetter
ClusterClient v3.ClusterInterface
NodeTemplateGetter v3.NodeTemplatesGetter
UserMgr user.Manager
ClusterManager *clustermanager.Manager
BackupClient v3.EtcdBackupInterface
}
func (a ActionHandler) ClusterActionHandler(actionName string, action *types.Action, apiContext *types.APIContext) error {
canUpdateCluster := func() bool {
cluster := map[string]interface{}{
"id": apiContext.ID,
}
return apiContext.AccessControl.CanDo(v3.ClusterGroupVersionKind.Group, v3.ClusterResource.Name, "update", apiContext, cluster, apiContext.Schema) == nil
}
switch actionName {
case "generateKubeconfig":
return a.GenerateKubeconfigActionHandler(actionName, action, apiContext)
case "importYaml":
return a.ImportYamlHandler(actionName, action, apiContext)
case "exportYaml":
return a.ExportYamlHandler(actionName, action, apiContext)
case "viewMonitoring":
return a.viewMonitoring(actionName, action, apiContext)
case "editMonitoring":
if !canUpdateCluster() {
return httperror.NewAPIError(httperror.Unauthorized, "can not access")
}
return a.editMonitoring(actionName, action, apiContext)
case "enableMonitoring":
if !canUpdateCluster() {
return httperror.NewAPIError(httperror.Unauthorized, "can not access")
}
return a.enableMonitoring(actionName, action, apiContext)
case "disableMonitoring":
if !canUpdateCluster() {
return httperror.NewAPIError(httperror.Unauthorized, "can not access")
}
return a.disableMonitoring(actionName, action, apiContext)
case "backupEtcd":
if !canUpdateCluster() {
return httperror.NewAPIError(httperror.Unauthorized, "can not backup etcd")
}
return a.BackupEtcdHandler(actionName, action, apiContext)
case "restoreFromEtcdBackup":
if !canUpdateCluster() {
return httperror.NewAPIError(httperror.Unauthorized, "can not restore etcd backup")
}
return a.RestoreFromEtcdBackupHandler(actionName, action, apiContext)
case "rotateCertificates":
if !canUpdateCluster() {
return httperror.NewAPIError(httperror.Unauthorized, "can not rotate certificates")
}
return a.RotateCertificates(actionName, action, apiContext)
}
return httperror.NewAPIError(httperror.NotFound, "not found")
}
func (a ActionHandler) getClusterToken(clusterID string, apiContext *types.APIContext) (string, error) {
userName := a.UserMgr.GetUser(apiContext)
return a.UserMgr.EnsureClusterToken(clusterID, fmt.Sprintf("kubeconfig-%s.%s", userName, clusterID), "Kubeconfig token", userName)
}
func (a ActionHandler) getToken(apiContext *types.APIContext) (string, error) {
userName := a.UserMgr.GetUser(apiContext)
return a.UserMgr.EnsureToken("kubeconfig-"+userName, "Kubeconfig token", userName)
}
func (a ActionHandler) GenerateKubeconfigActionHandler(actionName string, action *types.Action, apiContext *types.APIContext) error {
var cluster mgmtclient.Cluster
if err := access.ByID(apiContext, apiContext.Version, apiContext.Type, apiContext.ID, &cluster); err != nil {
return err
}
var (
cfg string
token string
err error
)
if cluster.LocalClusterAuthEndpoint.Enabled {
token, err = a.getClusterToken(cluster.ID, apiContext)
} else {
token, err = a.getToken(apiContext)
}
if err != nil {
return err
}
userName := a.UserMgr.GetUser(apiContext)
if cluster.LocalClusterAuthEndpoint.Enabled {
cfg, err = kubeconfig.ForClusterTokenBased(&cluster, apiContext.ID, apiContext.Request.Host, userName, token)
} else {
cfg, err = kubeconfig.ForTokenBased(cluster.Name, apiContext.ID, apiContext.Request.Host, userName, token)
}
if err != nil {
return err
}
data := map[string]interface{}{
"config": cfg,
"type": "generateKubeconfigOutput",
}
apiContext.WriteResponse(http.StatusOK, data)
return nil
}
func (a ActionHandler) ImportYamlHandler(actionName string, action *types.Action, apiContext *types.APIContext) error {
data, err := ioutil.ReadAll(apiContext.Request.Body)
if err != nil {
return errors.Wrap(err, "reading request body error")
}
input := mgmtclient.ImportClusterYamlInput{}
if err = json.Unmarshal(data, &input); err != nil {
return errors.Wrap(err, "unmarshaling input error")
}
var cluster mgmtclient.Cluster
if err := access.ByID(apiContext, apiContext.Version, apiContext.Type, apiContext.ID, &cluster); err != nil {
return err
}
cfg, err := a.getKubeConfig(apiContext, &cluster)
if err != nil {
return err
}
for _, context := range cfg.Contexts {
if input.DefaultNamespace == "" {
context.Namespace = input.Namespace
} else {
context.Namespace = input.DefaultNamespace
}
}
var msg []byte
if input.ProjectID != "" {
err = a.processYAML(apiContext, cluster.ID, input.ProjectID, input.YAML)
if err == nil {
msg, err = kubectl.Apply([]byte(input.YAML), cfg)
}
} else if input.Namespace == "" {
msg, err = kubectl.Apply([]byte(input.YAML), cfg)
} else {
msg, err = kubectl.ApplyWithNamespace([]byte(input.YAML), input.Namespace, cfg)
}
rtn := map[string]interface{}{
"message": string(msg),
"type": "importYamlOutput",
}
if err == nil {
apiContext.WriteResponse(http.StatusOK, rtn)
} else {
if rtn["message"] == "" {
rtn["message"] = err.Error()
}
apiContext.WriteResponse(http.StatusBadRequest, rtn)
}
return nil
}
func (a ActionHandler) ExportYamlHandler(actionName string, action *types.Action, apiContext *types.APIContext) error {
cluster, err := a.ClusterClient.Get(apiContext.ID, metav1.GetOptions{})
if err != nil {
return err
}
topkey := compose.Config{}
topkey.Version = "v3"
c := mgmtclient.Cluster{}
if err := convert.ToObj(cluster.Spec, &c); err != nil {
return err
}
topkey.Clusters = map[string]mgmtclient.Cluster{}
topkey.Clusters[cluster.Spec.DisplayName] = c
// if driver is rancherKubernetesEngine, add any nodePool if found
if cluster.Status.Driver == v3.ClusterDriverRKE {
nodepools, err := a.NodepoolGetter.NodePools(cluster.Name).List(metav1.ListOptions{})
if err != nil {
return err
}
topkey.NodePools = map[string]mgmtclient.NodePool{}
for _, nodepool := range nodepools.Items {
n := mgmtclient.NodePool{}
if err := convert.ToObj(nodepool.Spec, &n); err != nil {
return err
}
n.ClusterID = cluster.Spec.DisplayName
namespace, id := ref.Parse(nodepool.Spec.NodeTemplateName)
nodeTemplate, err := a.NodeTemplateGetter.NodeTemplates(namespace).Get(id, metav1.GetOptions{})
if err != nil {
return err
}
n.NodeTemplateID = nodeTemplate.Spec.DisplayName
topkey.NodePools[nodepool.Name] = n
}
}
m, err := convert.EncodeToMap(topkey)
if err != nil {
return err
}
delete(m["clusters"].(map[string]interface{})[cluster.Spec.DisplayName].(map[string]interface{}), "actions")
delete(m["clusters"].(map[string]interface{})[cluster.Spec.DisplayName].(map[string]interface{}), "links")
for name := range topkey.NodePools {
delete(m["nodePools"].(map[string]interface{})[name].(map[string]interface{}), "actions")
delete(m["nodePools"].(map[string]interface{})[name].(map[string]interface{}), "links")
}
data, err := json.Marshal(m)
if err != nil {
return err
}
buf, err := yaml2.JSONToYAML(data)
if err != nil {
return err
}
if apiContext.ResponseFormat == "yaml" {
reader := bytes.NewReader(buf)
apiContext.Response.Header().Set("Content-Type", "application/yaml")
http.ServeContent(apiContext.Response, apiContext.Request, "exportYaml", time.Now(), reader)
return nil
}
r := v3.ExportOutput{
YAMLOutput: string(buf),
}
jsonOutput, err := json.Marshal(r)
if err != nil {
return err
}
reader := bytes.NewReader(jsonOutput)
apiContext.Response.Header().Set("Content-Type", "application/json")
http.ServeContent(apiContext.Response, apiContext.Request, "exportYaml", time.Now(), reader)
return nil
}
func (a ActionHandler) viewMonitoring(actionName string, action *types.Action, apiContext *types.APIContext) error {
cluster, err := a.ClusterClient.Get(apiContext.ID, metav1.GetOptions{})
if err != nil {
return httperror.WrapAPIError(err, httperror.NotFound, "none existent Cluster")
}
if cluster.DeletionTimestamp != nil {
return httperror.NewAPIError(httperror.InvalidType, "deleting Cluster")
}
if !cluster.Spec.EnableClusterMonitoring {
return httperror.NewAPIError(httperror.InvalidState, "disabling Monitoring")
}
// need to support `map[string]string` as entry value type in norman Builder.convertMap
answers, err := convert.EncodeToMap(monitoring.GetOverwroteAppAnswers(cluster.Annotations))
if err != nil {
return httperror.WrapAPIError(err, httperror.ServerError, "failed to parse response")
}
apiContext.WriteResponse(http.StatusOK, map[string]interface{}{
"answers": answers,
"type": "monitoringOutput",
})
return nil
}
func (a ActionHandler) editMonitoring(actionName string, action *types.Action, apiContext *types.APIContext) error {
cluster, err := a.ClusterClient.Get(apiContext.ID, metav1.GetOptions{})
if err != nil {
return httperror.WrapAPIError(err, httperror.NotFound, "none existent Cluster")
}
if cluster.DeletionTimestamp != nil {
return httperror.NewAPIError(httperror.InvalidType, "deleting Cluster")
}
if !cluster.Spec.EnableClusterMonitoring {
return httperror.NewAPIError(httperror.InvalidState, "disabling Monitoring")
}
data, err := ioutil.ReadAll(apiContext.Request.Body)
if err != nil {
return httperror.WrapAPIError(err, httperror.InvalidBodyContent, "unable to read request content")
}
var input v3.MonitoringInput
if err = json.Unmarshal(data, &input); err != nil {
return httperror.WrapAPIError(err, httperror.InvalidBodyContent, "failed to parse request content")
}
cluster = cluster.DeepCopy()
cluster.Annotations = monitoring.AppendAppOverwritingAnswers(cluster.Annotations, string(data))
_, err = a.ClusterClient.Update(cluster)
if err != nil {
return httperror.WrapAPIError(err, httperror.ServerError, "failed to upgrade monitoring")
}
apiContext.WriteResponse(http.StatusNoContent, map[string]interface{}{})
return nil
}
func (a ActionHandler) enableMonitoring(actionName string, action *types.Action, apiContext *types.APIContext) error {
cluster, err := a.ClusterClient.Get(apiContext.ID, metav1.GetOptions{})
if err != nil {
return httperror.WrapAPIError(err, httperror.NotFound, "none existent Cluster")
}
if cluster.DeletionTimestamp != nil {
return httperror.NewAPIError(httperror.InvalidType, "deleting Cluster")
}
if cluster.Spec.EnableClusterMonitoring {
apiContext.WriteResponse(http.StatusNoContent, map[string]interface{}{})
return nil
}
data, err := ioutil.ReadAll(apiContext.Request.Body)
if err != nil {
return httperror.WrapAPIError(err, httperror.InvalidBodyContent, "unable to read request content")
}
var input v3.MonitoringInput
if err = json.Unmarshal(data, &input); err != nil {
return httperror.WrapAPIError(err, httperror.InvalidBodyContent, "failed to parse request content")
}
cluster = cluster.DeepCopy()
cluster.Spec.EnableClusterMonitoring = true
cluster.Annotations = monitoring.AppendAppOverwritingAnswers(cluster.Annotations, string(data))
_, err = a.ClusterClient.Update(cluster)
if err != nil {
return httperror.WrapAPIError(err, httperror.ServerError, "failed to enable monitoring")
}
apiContext.WriteResponse(http.StatusNoContent, map[string]interface{}{})
return nil
}
func (a ActionHandler) disableMonitoring(actionName string, action *types.Action, apiContext *types.APIContext) error {
cluster, err := a.ClusterClient.Get(apiContext.ID, metav1.GetOptions{})
if err != nil {
return httperror.WrapAPIError(err, httperror.NotFound, "none existent Cluster")
}
if cluster.DeletionTimestamp != nil {
return httperror.NewAPIError(httperror.InvalidType, "deleting Cluster")
}
if !cluster.Spec.EnableClusterMonitoring {
apiContext.WriteResponse(http.StatusNoContent, map[string]interface{}{})
return nil
}
cluster = cluster.DeepCopy()
cluster.Spec.EnableClusterMonitoring = false
_, err = a.ClusterClient.Update(cluster)
if err != nil {
return httperror.WrapAPIError(err, httperror.ServerError, "failed to disable monitoring")
}
apiContext.WriteResponse(http.StatusNoContent, map[string]interface{}{})
return nil
}
type noopCloser struct {
io.Reader
}
func (noopCloser) Close() error {
return nil
}
func findNamespaceCreates(inputYAML string) ([]string, error) {
var namespaces []string
reader := yaml.NewDocumentDecoder(noopCloser{Reader: bytes.NewBufferString(inputYAML)})
for {
next, readErr := ioutil.ReadAll(reader)
if readErr != nil && readErr != io.ErrShortBuffer {
return nil, readErr
}
obj := &unstructured.Unstructured{}
next, err := yaml2.YAMLToJSON(next)
if err != nil {
return nil, err
}
err = json.Unmarshal(next, &obj.Object)
if err != nil {
return nil, err
}
if obj.IsList() {
obj.EachListItem(func(obj runtime.Object) error {
metadata, err := meta.Accessor(obj)
if err != nil {
return err
}
if obj.GetObjectKind().GroupVersionKind().Kind == "Namespace" && obj.GetObjectKind().GroupVersionKind().Version == "v1" {
namespaces = append(namespaces, metadata.GetName())
}
if metadata.GetNamespace() != "" {
namespaces = append(namespaces, metadata.GetNamespace())
}
return nil
})
} else if obj.GetKind() == "Namespace" && obj.GetAPIVersion() == "v1" {
namespaces = append(namespaces, obj.GetName())
if obj.GetNamespace() != "" {
namespaces = append(namespaces, obj.GetNamespace())
}
}
if readErr == nil {
break
}
}
uniq := map[string]bool{}
var newNamespaces []string
for _, ns := range namespaces {
if !uniq[ns] {
uniq[ns] = true
newNamespaces = append(newNamespaces, ns)
}
}
return newNamespaces, nil
}
func (a ActionHandler) findOrCreateProjectNamespaces(apiContext *types.APIContext, namespaces []string, clusterName, projectName string) (corev1.NamespaceInterface, error) {
userCtx, err := a.ClusterManager.UserContext(clusterName)
if err != nil {
return nil, err
}
nsClient := userCtx.Core.Namespaces("")
for _, ns := range namespaces {
nsObj, err := nsClient.Get(ns, metav1.GetOptions{})
if errors2.IsNotFound(err) {
apiContext.SubContext = map[string]string{
"/v3/schemas/cluster": clusterName,
}
err := access.Create(apiContext, &schema.Version, client.NamespaceType, map[string]interface{}{
client.NamespaceFieldName: ns,
client.NamespaceFieldProjectID: projectName,
}, nil)
if err != nil {
return nil, err
}
} else if err != nil {
return nil, err
} else if nsObj.Annotations[nslabels.ProjectIDFieldLabel] == projectName {
// nothing
} else {
return nil, fmt.Errorf("Namespace [%s] already exists in project [%s]", ns, nsObj.Annotations[nslabels.ProjectIDFieldLabel])
}
}
return nsClient, nil
}
func waitForNS(nsClient corev1.NamespaceInterface, namespaces []string) {
for i := 0; i < 3; i++ {
allGood := true
for _, ns := range namespaces {
ns, err := nsClient.Get(ns, metav1.GetOptions{})
if err != nil {
allGood = false
break
}
status := ns.Annotations["cattle.io/status"]
if status == "" {
allGood = false
break
}
nsMap := map[string]interface{}{}
err = json.Unmarshal([]byte(status), &nsMap)
if err != nil {
allGood = false
break
}
foundCond := false
conds := convert.ToMapSlice(values.GetValueN(nsMap, "Conditions"))
for _, cond := range conds {
if cond["Type"] == "InitialRolesPopulated" && cond["Status"] == "True" {
foundCond = true
}
}
if !foundCond {
allGood = false
}
}
if allGood {
break
} else {
time.Sleep(2 * time.Second)
}
}
}
func (a ActionHandler) processYAML(apiContext *types.APIContext, clusterName, projectName, inputYAML string) error {
namespaces, err := findNamespaceCreates(inputYAML)
if err != nil {
return err
}
nsClient, err := a.findOrCreateProjectNamespaces(apiContext, namespaces, clusterName, projectName)
if err != nil {
return err
}
waitForNS(nsClient, namespaces)
return nil
}
func (a ActionHandler) getKubeConfig(apiContext *types.APIContext, cluster *mgmtclient.Cluster) (*clientcmdapi.Config, error) {
token, err := a.getToken(apiContext)
if err != nil {
return nil, err
}
return a.ClusterManager.KubeConfig(cluster.ID, token), nil
}
func (a ActionHandler) RotateCertificates(actionName string, action *types.Action, apiContext *types.APIContext) error {
rtn := map[string]interface{}{
"type": "rotateCertificateOutput",
"message": "rotating certificates for all components",
}
var mgmtCluster mgmtclient.Cluster
if err := access.ByID(apiContext, apiContext.Version, apiContext.Type, apiContext.ID, &mgmtCluster); err != nil {
rtn["message"] = "none existent Cluster"
apiContext.WriteResponse(http.StatusBadRequest, rtn)
return errors.Wrapf(err, "failed to get Cluster by ID %s", apiContext.ID)
}
cluster, err := a.ClusterClient.Get(apiContext.ID, metav1.GetOptions{})
if err != nil {
rtn["message"] = "none existent Cluster"
apiContext.WriteResponse(http.StatusBadRequest, rtn)
return errors.Wrapf(err, "failed to get Cluster by ID %s", apiContext.ID)
}
data, err := ioutil.ReadAll(apiContext.Request.Body)
if err != nil {
rtn["message"] = "reading request body error"
apiContext.WriteResponse(http.StatusBadRequest, rtn)
return errors.Wrapf(err, "failed to read request body")
}
input := mgmtclient.RotateCertificateInput{}
if err = json.Unmarshal(data, &input); err != nil {
rtn["message"] = "failed to parse request content"
apiContext.WriteResponse(http.StatusBadRequest, rtn)
return errors.Wrap(err, "unmarshaling input error")
}
rotateCerts := &v3.RotateCertificates{
CACertificates: input.CACertificates,
Services: []string{input.Services},
}
cluster.Spec.RancherKubernetesEngineConfig.RotateCertificates = rotateCerts
if _, err := a.ClusterClient.Update(cluster); err != nil {
rtn["message"] = "failed to update cluster object"
apiContext.WriteResponse(http.StatusInternalServerError, rtn)
return errors.Wrapf(err, "unable to update Cluster %s", cluster.Name)
}
if input.CACertificates {
rtn["message"] = "rotating CA certificates and all components"
} else if len(input.Services) > 0 {
rtn["message"] = fmt.Sprintf("rotating %s certificates", input.Services)
} else {
rtn["message"] = "rotating certificates for all components"
}
apiContext.WriteResponse(http.StatusOK, rtn)
return nil
}
func (a ActionHandler) BackupEtcdHandler(actionName string, action *types.Action, apiContext *types.APIContext) error {
response := map[string]interface{}{
"message": "starting ETCD backup",
}
// checking access
var mgmtCluster mgmtclient.Cluster
if err := access.ByID(apiContext, apiContext.Version, apiContext.Type, apiContext.ID, &mgmtCluster); err != nil {
response["message"] = "none existent Cluster"
apiContext.WriteResponse(http.StatusBadRequest, response)
return errors.Wrapf(err, "failed to get Cluster by ID %s", apiContext.ID)
}
cluster, err := a.ClusterClient.Get(apiContext.ID, metav1.GetOptions{})
if err != nil {
response["message"] = "none existent Cluster"
apiContext.WriteResponse(http.StatusBadRequest, response)
return errors.Wrapf(err, "failed to get Cluster by ID %s", apiContext.ID)
}
newBackup := etcdbackup.NewBackupObject(cluster, true)
backup, err := a.BackupClient.Create(newBackup)
if err != nil {
response["message"] = "failed to create etcdbackup object"
apiContext.WriteResponse(http.StatusInternalServerError, response)
return errors.Wrapf(err, "failed to cteate etcdbackup object")
}
backupJSON, err := json.Marshal(backup)
if err != nil {
return err
}
apiContext.Response.Header().Set("Content-Type", "application/json")
http.ServeContent(apiContext.Response, apiContext.Request, "backupEtcd", time.Now(), bytes.NewReader(backupJSON))
return nil
}
func (a ActionHandler) RestoreFromEtcdBackupHandler(actionName string, action *types.Action, apiContext *types.APIContext) error {
response := map[string]interface{}{
"message": "restoring etcdbackup for the cluster",
}
data, err := ioutil.ReadAll(apiContext.Request.Body)
if err != nil {
response["message"] = "reading request body error"
apiContext.WriteResponse(http.StatusInternalServerError, response)
return errors.Wrap(err, "failed to read request body")
}
input := mgmtclient.RestoreFromEtcdBackupInput{}
if err = json.Unmarshal(data, &input); err != nil {
response["message"] = "failed to parse request content"
apiContext.WriteResponse(http.StatusBadRequest, response)
return errors.Wrap(err, "unmarshaling input error")
}
// checking access
var mgmtCluster mgmtclient.Cluster
if err := access.ByID(apiContext, apiContext.Version, apiContext.Type, apiContext.ID, &mgmtCluster); err != nil {
response["message"] = "nonexistent Cluster"
apiContext.WriteResponse(http.StatusBadRequest, response)
return errors.Wrapf(err, "failed to get Cluster by ID %s", apiContext.ID)
}
cluster, err := a.ClusterClient.Get(apiContext.ID, metav1.GetOptions{})
if err != nil {
response["message"] = "nonexistent Cluster"
apiContext.WriteResponse(http.StatusBadRequest, response)
return errors.Wrapf(err, "failed to get Cluster by ID %s", apiContext.ID)
}
clusterBackupConfig := cluster.Spec.RancherKubernetesEngineConfig.Services.Etcd.BackupConfig
if clusterBackupConfig != nil && clusterBackupConfig.S3BackupConfig == nil {
ns, name := ref.Parse(input.EtcdBackupID)
if ns == "" || name == "" {
return httperror.NewAPIError(httperror.InvalidFormat, fmt.Sprintf("invalid input id %s", input.EtcdBackupID))
}
backup, err := a.BackupClient.GetNamespaced(ns, name, metav1.GetOptions{})
if err != nil {
response["message"] = "error getting backup config"
apiContext.WriteResponse(http.StatusInternalServerError, response)
return errors.Wrapf(err, "failed to get backup config by ID %s", input.EtcdBackupID)
}
if backup.Spec.BackupConfig.S3BackupConfig != nil {
return httperror.NewAPIError(httperror.MethodNotAllowed,
fmt.Sprintf("restoring S3 backups with no cluster level S3 configuration is not supported %s", input.EtcdBackupID))
}
}
cluster.Spec.RancherKubernetesEngineConfig.Restore.SnapshotName = input.EtcdBackupID
cluster.Spec.RancherKubernetesEngineConfig.Restore.Restore = true
if _, err = a.ClusterClient.Update(cluster); err != nil {
response["message"] = "failed to update cluster object"
apiContext.WriteResponse(http.StatusInternalServerError, response)
return errors.Wrapf(err, "unable to update Cluster %s", cluster.Name)
}
apiContext.WriteResponse(http.StatusCreated, response)
return nil
}
马建仓 AI 助手
尝试更多
代码解读
代码找茬
代码优化
Go
1
https://gitee.com/rancher/rancher.git
git@gitee.com:rancher/rancher.git
rancher
rancher
rancher
v2.2.2-rc2

搜索帮助